You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The status of lord represented one of the most original solutions to the political and social transitions of the Medieval period. Questions still remain unanswered and require further investigation, thus many scholars have collaborated to produce this collection which offers a synthesis of the most recent scholarship. This book relates the workings of seigneurial systems in different areas of Europe, from the Baltic to the Mediterranean, from Castile to Pontus. In this way, the perspective remains the same, institutional and material. This book emphasises both the institutional and informal forms of lordship identified and crystallised by social and political actors (for example, communities, sovereigns, nobles, bishops, and abbots). It offers a general framework for those approaching the subject for the first time and a useful in-depth tool with numerous regional cases for long-term scholars.
These proceedings include a collection of papers on a range of topics presented at the 12th World Congress on Engineering Asset Management (WCEAM) in Brisbane, 2 – 4 August 2017. Effective strategies are required for managing complex engineering assets such as built environments, infrastructure, plants, equipment, hardware systems and components. Following the release of the ISO 5500x set of standards in 2014, the 12th WCEAM addressed important issues covering all aspects of engineering asset management across various sectors including health. The topics discussed by the congress delegates are grouped into a number of tracks, including strategies for investment and divestment of assets, operations and maintenance of assets, assessment of assets’ health conditions, risk and vulnerability, technologies, and systems for management of assets, standards, education, training and certification.
This thesis examines the morphological changes of non-tidal meandering rivers at the spatial scale of several meanders. With this purpose, a physics-based mathematical model, MIANDRAS, has been developed for the simulation of the medium-term to long-term evolution of meandering rivers. Application to several real rivers shows that MIANDRAS can properly simulate both equilibrium river bed topography and planimetric changes. Three models of different complexity can be obtained by applying different degrees of simplification to the equations. These models, along with experimental tests and field data, constitute the tools for several analyses. At conditions of initiation of meandering, it is found that river bends can migrate upstream and downstream. This depends on meander wave length and width-to-depth ratio, irrespective of whether the parameters are in the subresonant or the superresonant range.
This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.
This book constitutes the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection, RAID 2007, held in Gold Coast, Australia in September 2007. The 17 revised full papers presented were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on anomaly detection, attacks, system evaluation and threat assessment, malware collection and analysis, anomaly- and specification-based detection, and network intrusion detection.
This volume is the product of the International Conference on Cohesive Sediment Transport (INTERCOH 2003) held at the Virginia Institute of Marine Science, U.S.A., during October 1-4, 2003. The topics included in this monograph range from basic research on cohesive sediment dynamics to practical applications. Also included with this book is a database that contains all experimental results as well as a comparison of numerical simulation results supported by the COSINUS project.* Provides fundamental knowledge of the dynamics of cohesive sediments* Presents practical applications of new finds on sedimentary processes* Includes valuable ready-for-use data
This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.
The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The...
This book contains the proceedings of a non-profit conference with the objective of providing a platform for academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad, and exchanging their research and innovative ideas in the field of Artificial Intelligence and Information Technologies. It begins with exploring the research and innovation in the field of Artificial Intelligence and Information Technologies including secure transaction, monitoring, real time assistance and security for advanced stage learners, researchers and academicians has been presented. It goes on to cover: Broad knowledge and research trends about artifi...